Skip to main content

Security News

Filter by:

Phishing Scams: How To Recognize A Scam Email, VOIP call, or Text

A phishing scam is not only about stealing your login credentials, but it can also install malware, including ransomware, which is why it is essential to learn how to tackle this growing threat.
Hackread 12 Dec 2022 673 Views

Zombinder on Dark Web Lets Hackers Add Malware to Legit Apps

At the moment, Zombinder is focusing entirely on Android apps but the service operators are offering Windows apps binding services.
Thehackernews 12 Dec 2022 859 Views

Apple Boosts Security With New iMessage, Apple ID, and iCloud Protections

Apple on Wednesday announced a raft of security measures, including an Advanced Data Protection setting that enables end-to-end encrypted (E2EE) data backups in its iCloud service.
Thehackernews 9 Dec 2022 743 Views

New Google Chrome feature frees memory to make browsing smoother

Google says the latest release of Chrome for desktop devices now comes with a new performance-boosting feature designed to free up memory and make web browsing smoother.
Bleepingcomputer 9 Dec 2022 799 Views

Apple rolls out end-to-end encryption for iCloud backups

Apple introduced today Advanced Data Protection for iCloud, a new feature that uses end-to-end encryption to protect sensitive iCloud data, including backups, photos, notes, and more. [...]
Bleepingcomputer 8 Dec 2022 782 Views

How to locate a user's GPG key in Thunderbird

If you're using encrypted email in Thunderbird, you might be happy to know there's an easy way to locate a recipient's GPG key.
ZDnet 8 Dec 2022 1000 Views

Rackspace Incident Highlights How Disruptive Attacks on Cloud Providers Can Be

A ransomware attack on the company's Hosted Exchange environment disrupted email for thousands of mostly small and midsize businesses.
Dark Reading 8 Dec 2022 830 Views

Microsoft: Hackers target cryptocurrency firms over Telegram

Microsoft says that cryptocurrency investment companies have been targeted by a threat group it tracks as DEV-0139 via Telegram groups used to communicate with the firms' VIP customers.
Bleeping Computer 7 Dec 2022 713 Views

Hackers use new, fake crypto app to breach networks, steal cryptocurrency

The North Korean 'Lazarus' hacking group is linked to a new attack spreading fake cryptocurrency apps under the made-up brand, "BloxHolder," to install the AppleJeus malware for initial access to networks and steal crypto assets. [...]
Bleepingcomputer 3 Dec 2022 694 Views

Rackspace rocked by ‘security incident’ that has taken out hosted Exchange services

Some of Rackspace’s hosted Microsoft Exchange services have been taken down by what the company has described as a “security incident”.…
The Register 3 Dec 2022 6864 Views